[PATCH] Fix SAK_work workqueue initialization.
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / drivers / char / sysrq.c
CommitLineData
1da177e4
LT
1/* -*- linux-c -*-
2 *
3 * $Id: sysrq.c,v 1.15 1998/08/23 14:56:41 mj Exp $
4 *
5 * Linux Magic System Request Key Hacks
6 *
7 * (c) 1997 Martin Mares <mj@atrey.karlin.mff.cuni.cz>
8 * based on ideas by Pavel Machek <pavel@atrey.karlin.mff.cuni.cz>
9 *
10 * (c) 2000 Crutcher Dunnavant <crutcher+kernel@datastacks.com>
11 * overhauled to use key registration
12 * based upon discusions in irc://irc.openprojects.net/#kernelnewbies
13 */
14
1da177e4
LT
15#include <linux/sched.h>
16#include <linux/interrupt.h>
17#include <linux/mm.h>
18#include <linux/fs.h>
19#include <linux/tty.h>
20#include <linux/mount.h>
21#include <linux/kdev_t.h>
22#include <linux/major.h>
23#include <linux/reboot.h>
24#include <linux/sysrq.h>
25#include <linux/kbd_kern.h>
26#include <linux/quotaops.h>
27#include <linux/smp_lock.h>
28#include <linux/kernel.h>
29#include <linux/module.h>
30#include <linux/suspend.h>
31#include <linux/writeback.h>
32#include <linux/buffer_head.h> /* for fsync_bdev() */
33#include <linux/swap.h>
34#include <linux/spinlock.h>
35#include <linux/vt_kern.h>
36#include <linux/workqueue.h>
86b1ae38 37#include <linux/kexec.h>
7d12e780 38#include <linux/irq.h>
1da177e4
LT
39
40#include <asm/ptrace.h>
2033b0c3 41#include <asm/irq_regs.h>
1da177e4
LT
42
43/* Whether we react on sysrq keys or just ignore them */
5d6f647f
IM
44int __read_mostly __sysrq_enabled = 1;
45
46static int __read_mostly sysrq_always_enabled;
47
48int sysrq_on(void)
49{
50 return __sysrq_enabled || sysrq_always_enabled;
51}
52
53/*
54 * A value of 1 means 'all', other nonzero values are an op mask:
55 */
56static inline int sysrq_on_mask(int mask)
57{
58 return sysrq_always_enabled || __sysrq_enabled == 1 ||
59 (__sysrq_enabled & mask);
60}
61
62static int __init sysrq_always_enabled_setup(char *str)
63{
64 sysrq_always_enabled = 1;
65 printk(KERN_INFO "debug: sysrq always enabled.\n");
66
67 return 1;
68}
69
70__setup("sysrq_always_enabled", sysrq_always_enabled_setup);
71
1da177e4 72
7d12e780 73static void sysrq_handle_loglevel(int key, struct tty_struct *tty)
1da177e4
LT
74{
75 int i;
76 i = key - '0';
77 console_loglevel = 7;
78 printk("Loglevel set to %d\n", i);
79 console_loglevel = i;
bf36b901 80}
1da177e4
LT
81static struct sysrq_key_op sysrq_loglevel_op = {
82 .handler = sysrq_handle_loglevel,
83 .help_msg = "loglevel0-8",
84 .action_msg = "Changing Loglevel",
85 .enable_mask = SYSRQ_ENABLE_LOG,
86};
87
1da177e4 88#ifdef CONFIG_VT
7d12e780 89static void sysrq_handle_SAK(int key, struct tty_struct *tty)
1da177e4 90{
8b6312f4 91 struct work_struct *SAK_work = &vc_cons[fg_console].SAK_work;
8b6312f4 92 schedule_work(SAK_work);
1da177e4
LT
93}
94static struct sysrq_key_op sysrq_SAK_op = {
95 .handler = sysrq_handle_SAK,
96 .help_msg = "saK",
97 .action_msg = "SAK",
98 .enable_mask = SYSRQ_ENABLE_KEYBOARD,
99};
bf36b901
AM
100#else
101#define sysrq_SAK_op (*(struct sysrq_key_op *)0)
1da177e4
LT
102#endif
103
104#ifdef CONFIG_VT
7d12e780 105static void sysrq_handle_unraw(int key, struct tty_struct *tty)
1da177e4
LT
106{
107 struct kbd_struct *kbd = &kbd_table[fg_console];
108
109 if (kbd)
110 kbd->kbdmode = VC_XLATE;
111}
112static struct sysrq_key_op sysrq_unraw_op = {
113 .handler = sysrq_handle_unraw,
114 .help_msg = "unRaw",
115 .action_msg = "Keyboard mode set to XLATE",
116 .enable_mask = SYSRQ_ENABLE_KEYBOARD,
117};
bf36b901
AM
118#else
119#define sysrq_unraw_op (*(struct sysrq_key_op *)0)
1da177e4
LT
120#endif /* CONFIG_VT */
121
86b1ae38 122#ifdef CONFIG_KEXEC
7d12e780 123static void sysrq_handle_crashdump(int key, struct tty_struct *tty)
86b1ae38 124{
7d12e780 125 crash_kexec(get_irq_regs());
86b1ae38
HN
126}
127static struct sysrq_key_op sysrq_crashdump_op = {
128 .handler = sysrq_handle_crashdump,
129 .help_msg = "Crashdump",
130 .action_msg = "Trigger a crashdump",
131 .enable_mask = SYSRQ_ENABLE_DUMP,
132};
bf36b901
AM
133#else
134#define sysrq_crashdump_op (*(struct sysrq_key_op *)0)
86b1ae38
HN
135#endif
136
7d12e780 137static void sysrq_handle_reboot(int key, struct tty_struct *tty)
1da177e4 138{
b2e9c7d0 139 lockdep_off();
1da177e4 140 local_irq_enable();
4de8b9b7 141 emergency_restart();
1da177e4 142}
1da177e4
LT
143static struct sysrq_key_op sysrq_reboot_op = {
144 .handler = sysrq_handle_reboot,
145 .help_msg = "reBoot",
146 .action_msg = "Resetting",
147 .enable_mask = SYSRQ_ENABLE_BOOT,
148};
149
7d12e780 150static void sysrq_handle_sync(int key, struct tty_struct *tty)
1da177e4
LT
151{
152 emergency_sync();
153}
1da177e4
LT
154static struct sysrq_key_op sysrq_sync_op = {
155 .handler = sysrq_handle_sync,
156 .help_msg = "Sync",
157 .action_msg = "Emergency Sync",
158 .enable_mask = SYSRQ_ENABLE_SYNC,
159};
160
7d12e780 161static void sysrq_handle_mountro(int key, struct tty_struct *tty)
1da177e4
LT
162{
163 emergency_remount();
164}
1da177e4
LT
165static struct sysrq_key_op sysrq_mountro_op = {
166 .handler = sysrq_handle_mountro,
167 .help_msg = "Unmount",
168 .action_msg = "Emergency Remount R/O",
169 .enable_mask = SYSRQ_ENABLE_REMOUNT,
170};
171
8c64580d 172#ifdef CONFIG_LOCKDEP
7d12e780 173static void sysrq_handle_showlocks(int key, struct tty_struct *tty)
de5097c2 174{
9a11b49a 175 debug_show_all_locks();
de5097c2 176}
8c64580d 177
de5097c2
IM
178static struct sysrq_key_op sysrq_showlocks_op = {
179 .handler = sysrq_handle_showlocks,
180 .help_msg = "show-all-locks(D)",
181 .action_msg = "Show Locks Held",
182};
bf36b901
AM
183#else
184#define sysrq_showlocks_op (*(struct sysrq_key_op *)0)
de5097c2 185#endif
1da177e4 186
7d12e780 187static void sysrq_handle_showregs(int key, struct tty_struct *tty)
1da177e4 188{
7d12e780
DH
189 struct pt_regs *regs = get_irq_regs();
190 if (regs)
191 show_regs(regs);
1da177e4
LT
192}
193static struct sysrq_key_op sysrq_showregs_op = {
194 .handler = sysrq_handle_showregs,
195 .help_msg = "showPc",
196 .action_msg = "Show Regs",
197 .enable_mask = SYSRQ_ENABLE_DUMP,
198};
199
7d12e780 200static void sysrq_handle_showstate(int key, struct tty_struct *tty)
1da177e4
LT
201{
202 show_state();
203}
204static struct sysrq_key_op sysrq_showstate_op = {
205 .handler = sysrq_handle_showstate,
206 .help_msg = "showTasks",
207 .action_msg = "Show State",
208 .enable_mask = SYSRQ_ENABLE_DUMP,
209};
210
e59e2ae2
IM
211static void sysrq_handle_showstate_blocked(int key, struct tty_struct *tty)
212{
213 show_state_filter(TASK_UNINTERRUPTIBLE);
214}
215static struct sysrq_key_op sysrq_showstate_blocked_op = {
216 .handler = sysrq_handle_showstate_blocked,
d346cce3 217 .help_msg = "shoW-blocked-tasks",
e59e2ae2
IM
218 .action_msg = "Show Blocked State",
219 .enable_mask = SYSRQ_ENABLE_DUMP,
220};
221
222
7d12e780 223static void sysrq_handle_showmem(int key, struct tty_struct *tty)
1da177e4
LT
224{
225 show_mem();
226}
227static struct sysrq_key_op sysrq_showmem_op = {
228 .handler = sysrq_handle_showmem,
229 .help_msg = "showMem",
230 .action_msg = "Show Memory",
231 .enable_mask = SYSRQ_ENABLE_DUMP,
232};
233
bf36b901
AM
234/*
235 * Signal sysrq helper function. Sends a signal to all user processes.
236 */
1da177e4
LT
237static void send_sig_all(int sig)
238{
239 struct task_struct *p;
240
241 for_each_process(p) {
f400e198 242 if (p->mm && !is_init(p))
1da177e4
LT
243 /* Not swapper, init nor kernel thread */
244 force_sig(sig, p);
245 }
246}
247
7d12e780 248static void sysrq_handle_term(int key, struct tty_struct *tty)
1da177e4
LT
249{
250 send_sig_all(SIGTERM);
251 console_loglevel = 8;
252}
253static struct sysrq_key_op sysrq_term_op = {
254 .handler = sysrq_handle_term,
255 .help_msg = "tErm",
256 .action_msg = "Terminate All Tasks",
257 .enable_mask = SYSRQ_ENABLE_SIGNAL,
258};
259
65f27f38 260static void moom_callback(struct work_struct *ignored)
1da177e4 261{
bf36b901
AM
262 out_of_memory(&NODE_DATA(0)->node_zonelists[ZONE_NORMAL],
263 GFP_KERNEL, 0);
1da177e4
LT
264}
265
65f27f38 266static DECLARE_WORK(moom_work, moom_callback);
1da177e4 267
7d12e780 268static void sysrq_handle_moom(int key, struct tty_struct *tty)
1da177e4
LT
269{
270 schedule_work(&moom_work);
271}
272static struct sysrq_key_op sysrq_moom_op = {
273 .handler = sysrq_handle_moom,
274 .help_msg = "Full",
275 .action_msg = "Manual OOM execution",
276};
277
7d12e780 278static void sysrq_handle_kill(int key, struct tty_struct *tty)
1da177e4
LT
279{
280 send_sig_all(SIGKILL);
281 console_loglevel = 8;
282}
283static struct sysrq_key_op sysrq_kill_op = {
284 .handler = sysrq_handle_kill,
285 .help_msg = "kIll",
286 .action_msg = "Kill All Tasks",
287 .enable_mask = SYSRQ_ENABLE_SIGNAL,
288};
289
7d12e780 290static void sysrq_handle_unrt(int key, struct tty_struct *tty)
1da177e4
LT
291{
292 normalize_rt_tasks();
293}
294static struct sysrq_key_op sysrq_unrt_op = {
295 .handler = sysrq_handle_unrt,
296 .help_msg = "Nice",
297 .action_msg = "Nice All RT Tasks",
298 .enable_mask = SYSRQ_ENABLE_RTNICE,
299};
300
301/* Key Operations table and lock */
302static DEFINE_SPINLOCK(sysrq_key_table_lock);
bf36b901
AM
303
304static struct sysrq_key_op *sysrq_key_table[36] = {
305 &sysrq_loglevel_op, /* 0 */
306 &sysrq_loglevel_op, /* 1 */
307 &sysrq_loglevel_op, /* 2 */
308 &sysrq_loglevel_op, /* 3 */
309 &sysrq_loglevel_op, /* 4 */
310 &sysrq_loglevel_op, /* 5 */
311 &sysrq_loglevel_op, /* 6 */
312 &sysrq_loglevel_op, /* 7 */
313 &sysrq_loglevel_op, /* 8 */
314 &sysrq_loglevel_op, /* 9 */
315
316 /*
d346cce3
RD
317 * a: Don't use for system provided sysrqs, it is handled specially on
318 * sparc and will never arrive.
bf36b901
AM
319 */
320 NULL, /* a */
321 &sysrq_reboot_op, /* b */
d346cce3 322 &sysrq_crashdump_op, /* c & ibm_emac driver debug */
bf36b901
AM
323 &sysrq_showlocks_op, /* d */
324 &sysrq_term_op, /* e */
325 &sysrq_moom_op, /* f */
d346cce3 326 /* g: May be registered by ppc for kgdb */
bf36b901
AM
327 NULL, /* g */
328 NULL, /* h */
329 &sysrq_kill_op, /* i */
330 NULL, /* j */
331 &sysrq_SAK_op, /* k */
332 NULL, /* l */
333 &sysrq_showmem_op, /* m */
334 &sysrq_unrt_op, /* n */
d346cce3 335 /* o: This will often be registered as 'Off' at init time */
bf36b901
AM
336 NULL, /* o */
337 &sysrq_showregs_op, /* p */
338 NULL, /* q */
d346cce3 339 &sysrq_unraw_op, /* r */
bf36b901
AM
340 &sysrq_sync_op, /* s */
341 &sysrq_showstate_op, /* t */
342 &sysrq_mountro_op, /* u */
d346cce3 343 /* v: May be registered at init time by SMP VOYAGER */
bf36b901 344 NULL, /* v */
d346cce3
RD
345 &sysrq_showstate_blocked_op, /* w */
346 /* x: May be registered on ppc/powerpc for xmon */
347 NULL, /* x */
bf36b901
AM
348 NULL, /* y */
349 NULL /* z */
1da177e4
LT
350};
351
352/* key2index calculation, -1 on invalid index */
bf36b901
AM
353static int sysrq_key_table_key2index(int key)
354{
1da177e4 355 int retval;
bf36b901
AM
356
357 if ((key >= '0') && (key <= '9'))
1da177e4 358 retval = key - '0';
bf36b901 359 else if ((key >= 'a') && (key <= 'z'))
1da177e4 360 retval = key + 10 - 'a';
bf36b901 361 else
1da177e4 362 retval = -1;
1da177e4
LT
363 return retval;
364}
365
366/*
367 * get and put functions for the table, exposed to modules.
368 */
bf36b901
AM
369struct sysrq_key_op *__sysrq_get_key_op(int key)
370{
371 struct sysrq_key_op *op_p = NULL;
1da177e4 372 int i;
bf36b901 373
1da177e4 374 i = sysrq_key_table_key2index(key);
bf36b901
AM
375 if (i != -1)
376 op_p = sysrq_key_table[i];
1da177e4
LT
377 return op_p;
378}
379
bf36b901
AM
380static void __sysrq_put_key_op(int key, struct sysrq_key_op *op_p)
381{
382 int i = sysrq_key_table_key2index(key);
1da177e4 383
1da177e4
LT
384 if (i != -1)
385 sysrq_key_table[i] = op_p;
386}
387
388/*
bf36b901
AM
389 * This is the non-locking version of handle_sysrq. It must/can only be called
390 * by sysrq key handlers, as they are inside of the lock
1da177e4 391 */
7d12e780 392void __handle_sysrq(int key, struct tty_struct *tty, int check_mask)
1da177e4
LT
393{
394 struct sysrq_key_op *op_p;
395 int orig_log_level;
bf36b901 396 int i;
1da177e4
LT
397 unsigned long flags;
398
399 spin_lock_irqsave(&sysrq_key_table_lock, flags);
400 orig_log_level = console_loglevel;
401 console_loglevel = 7;
402 printk(KERN_INFO "SysRq : ");
403
404 op_p = __sysrq_get_key_op(key);
405 if (op_p) {
bf36b901
AM
406 /*
407 * Should we check for enabled operations (/proc/sysrq-trigger
408 * should not) and is the invoked operation enabled?
409 */
5d6f647f 410 if (!check_mask || sysrq_on_mask(op_p->enable_mask)) {
bf36b901 411 printk("%s\n", op_p->action_msg);
1da177e4 412 console_loglevel = orig_log_level;
7d12e780 413 op_p->handler(key, tty);
bf36b901 414 } else {
1da177e4 415 printk("This sysrq operation is disabled.\n");
bf36b901 416 }
1da177e4
LT
417 } else {
418 printk("HELP : ");
419 /* Only print the help msg once per handler */
bf36b901
AM
420 for (i = 0; i < ARRAY_SIZE(sysrq_key_table); i++) {
421 if (sysrq_key_table[i]) {
422 int j;
423
424 for (j = 0; sysrq_key_table[i] !=
425 sysrq_key_table[j]; j++)
426 ;
427 if (j != i)
428 continue;
429 printk("%s ", sysrq_key_table[i]->help_msg);
430 }
1da177e4 431 }
bf36b901 432 printk("\n");
1da177e4
LT
433 console_loglevel = orig_log_level;
434 }
435 spin_unlock_irqrestore(&sysrq_key_table_lock, flags);
436}
437
438/*
439 * This function is called by the keyboard handler when SysRq is pressed
440 * and any other keycode arrives.
441 */
7d12e780 442void handle_sysrq(int key, struct tty_struct *tty)
1da177e4 443{
5d6f647f
IM
444 if (sysrq_on())
445 __handle_sysrq(key, tty, 1);
1da177e4 446}
bf36b901 447EXPORT_SYMBOL(handle_sysrq);
1da177e4 448
cf62ddce 449static int __sysrq_swap_key_ops(int key, struct sysrq_key_op *insert_op_p,
bf36b901
AM
450 struct sysrq_key_op *remove_op_p)
451{
1da177e4
LT
452
453 int retval;
454 unsigned long flags;
455
456 spin_lock_irqsave(&sysrq_key_table_lock, flags);
457 if (__sysrq_get_key_op(key) == remove_op_p) {
458 __sysrq_put_key_op(key, insert_op_p);
459 retval = 0;
460 } else {
461 retval = -1;
462 }
463 spin_unlock_irqrestore(&sysrq_key_table_lock, flags);
1da177e4
LT
464 return retval;
465}
466
467int register_sysrq_key(int key, struct sysrq_key_op *op_p)
468{
469 return __sysrq_swap_key_ops(key, op_p, NULL);
470}
bf36b901 471EXPORT_SYMBOL(register_sysrq_key);
1da177e4
LT
472
473int unregister_sysrq_key(int key, struct sysrq_key_op *op_p)
474{
475 return __sysrq_swap_key_ops(key, NULL, op_p);
476}
1da177e4 477EXPORT_SYMBOL(unregister_sysrq_key);